Platform

Rootshell Platform – Patch Notes February 2026

4 min read
Stay ahead of the game
Loading

click here to copy URL

February 2026

New Features

Auto Asset Decommissioning

We’ve introduced Auto Asset Decommissioning, a powerful new capability designed to keep asset inventories accurate, relevant, and free from noise, particularly for environments with high asset churn.

Overview

Auto Asset Decommissioning allows the platform to automatically decommission assets that have not been tested or checked in within a configurable timeframe. This removes the need for manual clean-up and ensures reporting reflects only assets that are actively present in the environment.

Key Capabilities

  • New Settings Page: A dedicated Auto Asset Decommission page is available within the Settings menu.

  • Global Control: Enable or disable auto-decommissioning at any time with a single toggle.

  • Service-Specific Thresholds: Configure inactivity timeframes per service type, including Managed Vulnerability Scanning, Penetration Testing, Red Team Assessment, Ransomware, and ASM.

  • Customisable Defaults: Sensible default thresholds are provided and can be overridden to suit operational needs.

  • Automatic Enforcement: Assets that exceed the configured inactivity period are automatically decommissioned.

What Happens to Decommissioned Assets

  • Removed from active dashboards and reports.

  • Retained in audit and history logs for full traceability.

  • Reflected consistently across APIs and reporting outputs.

  • Logged with system notifications to maintain visibility and accountability.

This feature brings Rootshell in line with industry-standard asset hygiene practices, significantly reducing operational overhead and ensuring asset data remains accurate and actionable at scale.

ServiceNow Ticketing Integration with SSO (OAuth)

We’ve added a new authentication option for the ServiceNow ticketing integration, supporting SSO-enabled ServiceNow instances via OAuth.

Overview

In addition to the existing username and password method, users can now connect ServiceNow using OAuth. This enables secure, modern authentication aligned with ServiceNow SSO configurations and enterprise security standards.

Key Details

  • OAuth-Based Connection: Configure ServiceNow using host, client ID, client secret, and redirect URL.

  • Dual Support: Both authentication methods are supported in parallel, allowing flexibility during transition.

  • Future-Proofing: The username and password method is planned for deprecation in 2026, making OAuth the recommended approach going forward.

This update ensures continued compatibility with ServiceNow environments while improving security and aligning with modern authentication practices.

Platform Improvements

ConnectWise Ticketing Integration

We’ve delivered several improvements to the ConnectWise Manage integration to enhance usability, compatibility, and export reliability.

What’s Improved

  • Expanded Board Selection: The board dropdown now supports more than 100 boards, with the ability to search by typing for faster selection.

  • Ticket Title Trimming: Ticket titles are now automatically trimmed to 100 characters to meet ConnectWise limits and prevent export failures.

  • Flexible Host URL Validation: Host URL validation has been relaxed to support ConnectWise instances using custom or non-standard domains.

  • Optional Board Statuses: Board statuses are now optional during setup, allowing exports to boards without predefined statuses.

⚠️ Note: If no closed status is configured, the platform will be unable to automatically close tickets via bi-directional sync.

These updates improve reliability and flexibility when working with ConnectWise across diverse customer environments.

Bulk Ticket Creation from Affected Instances Across All Integrations

We’ve extended bulk ticket creation to support all connected ticketing systems directly from the Affected Instances view. Users can now select multiple affected instances and export them as individual tickets to Jira, ServiceNow, Freshdesk, ConnectWise, or TOPDesk in a single action.

This enhancement removes repetitive manual steps, significantly speeding up workflows where many affected instances need to be raised as separate tickets, while retaining the correct context for each instance.

Enhanced IP Allow listing Warning Modal

To help prevent accidental service disruption, we’ve enhanced the IP allow listing workflow with a new warning modal when allow listing is enabled.

What’s Improved

When a user enables IP allow listing, the platform now presents a clear prompt reminding them to:

  • Review and confirm that all required supplier IP addresses are included.

  • Acknowledge that enabling allow listing without these entries may disrupt active assessments and delay report delivery.

Why This Matters

This improvement helps avoid unintended access blocks during critical assessment phases, supporting smoother collaboration and reducing the risk of delays against agreed SLAs.

This small but important safeguard improves reliability and transparency when managing network access controls.

Enhanced CVSS Score Filtering

We’ve improved issue filtering by extending CVSS score filters to support multi-select options, bringing them in line with the existing Risk Rating filters.

What’s New

  • Multi-select CVSS filtering allows users to select multiple score ranges in one view.

  • Filter issues by CVSS score thresholds such as “7 and above”, rather than relying solely on High or Critical risk ratings.

  • Works consistently with existing filtering behaviour across the platform.

Why This Matters

This enhancement gives users greater precision when identifying impactful vulnerabilities, particularly for compliance-driven use cases such as Cyber Essentials, where CVSS thresholds are more relevant than risk ratings alone.

Picture of Jon Bellard
Jon Bellard
Jon Bellard is the Head of Product at Rootshell Security, where he leads the development of innovative cybersecurity solutions. With a strong background in security consulting and technical sales, Jon drives product strategy and client engagement to meet evolving security needs.

Other posts you might like

Penetration Testing Best Practices
Penetration testing
Penetration Testing Best Practices
Read blog post
26 Feb 2026